CVE-2016-2242
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
23/01/2017
Last modified:
20/04/2025
Description
Exponent CMS 2.x before 2.3.7 Patch 3 allows remote attackers to execute arbitrary code via the sc parameter to install/index.php.
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:exponentcms:exponent_cms:2.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.4:p3:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.5:p1:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.6:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.8:p2:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:exponentcms:exponent_cms:2.0.9:p5:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html
- http://www.exponentcms.org/news/patch-3-released-for-v2-3-7
- http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability
- http://www.securityfocus.com/archive/1/537499/100/0/threaded
- https://www.htbridge.com/advisory/HTB23290
- http://packetstormsecurity.com/files/135721/Exponent-2.3.7-PHP-Code-Execution.html
- http://www.exponentcms.org/news/patch-3-released-for-v2-3-7
- http://www.exponentcms.org/news/show/title/security-notice-closing-an-exponent-security-vulnerability
- http://www.securityfocus.com/archive/1/537499/100/0/threaded
- https://www.htbridge.com/advisory/HTB23290



